Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0732: Command Injection in D-Link DI-8200G

0
Medium
VulnerabilityCVE-2026-0732cvecve-2026-0732
Published: Thu Jan 08 2026 (01/08/2026, 23:32:08 UTC)
Source: CVE Database V5
Vendor/Project: D-Link
Product: DI-8200G

Description

A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:21:12 UTC

Technical Analysis

CVE-2026-0732 identifies a command injection vulnerability in the D-Link DI-8200G router firmware version 17.12.20A1. The flaw resides in an unspecified function within the /upgrade_filter.asp web interface file, where the 'path' parameter can be manipulated by an attacker to inject and execute arbitrary system commands. This vulnerability is exploitable remotely without requiring authentication or user interaction, making it accessible to any attacker with network access to the device. The vulnerability affects the device's command execution logic, potentially allowing attackers to gain unauthorized control over the router, modify configurations, disrupt network traffic, or pivot to internal networks. The CVSS v4.0 score of 5.3 reflects a medium severity, considering the ease of remote exploitation but limited scope and impact compared to more critical vulnerabilities. Although no patches or official fixes have been linked in the provided data, the public disclosure of exploit code increases the urgency for mitigation. The vulnerability impacts the confidentiality, integrity, and availability of the device and connected networks, as attackers could execute arbitrary commands leading to data leakage, device compromise, or denial of service. The lack of required authentication and user interaction significantly lowers the barrier for exploitation, emphasizing the importance of network-level protections and firmware updates. The affected product, D-Link DI-8200G, is a widely used router model, particularly in small to medium-sized business and residential environments, increasing the potential attack surface globally.

Potential Impact

The exploitation of CVE-2026-0732 can have significant impacts on organizations using the D-Link DI-8200G router. Successful command injection allows attackers to execute arbitrary commands with the privileges of the web server process, potentially escalating to full device control. This can lead to unauthorized configuration changes, interception or redirection of network traffic, installation of persistent malware, or complete denial of service. Compromise of the router undermines network perimeter security, enabling attackers to bypass firewalls and intrusion detection systems. For organizations, this can result in data breaches, disruption of business operations, loss of customer trust, and regulatory compliance violations. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in environments where these devices are exposed to untrusted networks or the internet. The medium severity score suggests moderate impact, but the real-world consequences depend on the network architecture and the criticality of the affected devices. Additionally, the public availability of exploit code raises the likelihood of opportunistic attacks targeting unpatched systems.

Mitigation Recommendations

To mitigate CVE-2026-0732, organizations should first verify if they are running the affected D-Link DI-8200G firmware version 17.12.20A1. Immediate steps include isolating affected devices from untrusted networks and restricting access to the router's management interface to trusted IP addresses only. Network segmentation should be enforced to limit exposure of vulnerable devices. Since no official patch links are provided, contacting D-Link support for firmware updates or advisories is critical. If patches are unavailable, consider upgrading to newer, supported hardware or firmware versions that address this vulnerability. Employ network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures targeting command injection attempts. Regularly monitor router logs for suspicious activity indicative of exploitation attempts. Disable unnecessary services and interfaces on the router to reduce attack surface. Finally, implement strong network access controls and enforce strict password policies to prevent lateral movement if the device is compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-08T15:25:51.430Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696040afecefc3cd7c7366f9

Added to database: 1/8/2026, 11:41:35 PM

Last enriched: 2/23/2026, 11:21:12 PM

Last updated: 3/25/2026, 10:18:04 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses